The Latest in IT Security

Posts Tagged ‘possibilities’

Flame is different in the sense that it is big in file size and complexity and it has many different possibilities, but none of the possibilities are overwhelming revolutionary or new: we have seen all these functions before. Furthermore, it is very difficult to determine how many computers have been infected and still are infected. […]

Read more ...

Android malware news: a year after Zsone’s discovery, we’ve come across a new variant. Or at least a sample that causes us to ask, is a new variant under development? This new Zsone uses a native component for its SMS sending routine. Here a code snippet from its binary component for sending SMS. However, its […]

Read more ...

A recent study published in various online magazines showed that more and more people tend to replace their traditional mobile phones with smartphones. This trend applies not only to young people who are usually more interested in new technologies but also to older people. So, what does this has to do with security? A smartphone […]

Read more ...


Categories

SUNDAY, APRIL 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments